Sciweavers

537 search results - page 42 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
CCS
2009
ACM
15 years 5 months ago
On non-cooperative location privacy: a game-theoretic analysis
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudo...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
72
Voted
OSDI
2008
ACM
15 years 11 months ago
CuriOS: Improving Reliability through Operating System Structure
An error that occurs in a microkernel operating system service can potentially result in state corruption and service failure. A simple restart of the failed service is not always...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
89
Voted
PRDC
2005
IEEE
15 years 4 months ago
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies....
Heng Xu, Arun K. Somani
102
Voted
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 2 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
WORM
2003
15 years 7 days ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...